Security Console: Privilege FUN_SUBMIT_ACCTG_HUB → Duty: Accounting Hub Mgmt → Job Role: Accounting Hub Journal Entry Management (not assigned)
Fusion security diagnostics via REST Identity API and OTBI — role assignments, dormant user detection, SOD conflict analysis, Data Security Policy completeness, and HCM Security Profile validity.
Oracle Fusion Cloud security role diagnostics address a more complex security model than Oracle EBS R12. Where EBS uses responsibility-based security with menu exclusions and function security profiles, Fusion uses a layered role model: Job Roles (coarse-grained, business function roles like Accounts Payable Manager), Duty Roles (functional groupings of privileges), Privilege Roles (individual action permissions like Create Invoice), and Data Security Policies (row-level access restrictions by business unit, legal entity, or data object). A user's effective access is the union of all privileges from all role assignments, minus any exclusions.
The most common Fusion security issue is a missing role assignment that prevents a user from accessing a function they need. In Fusion, every navigation path, every ESS submission, every REST API call, and every UI action requires at least one privilege. When a user reports they cannot see a menu item or cannot submit an ESS job, the diagnostic task is to identify which privilege controls that action, determine which duty role contains that privilege, determine which job role contains that duty role, and confirm whether the user has that job role assigned — or whether a data security policy is restricting access even with the correct role.
Data security policies are the second major complexity area. A user may have the correct job role to perform an action (functional security) but still be blocked because their data security policy does not grant access to the specific business unit or legal entity they are trying to work with. Fusion data security is managed through Security Console > Manage Data Access for Users, and diagnosing it requires checking both the user's role assignments and their data access grants separately — they are independent access controls.
SYS-08 provides a structured Fusion security diagnostic using Security Console for role hierarchy analysis, OTBI Security subject areas for user role assignment analysis, REST API GET /security/users/{id}/roles for programmatic role inspection, and the Fusion Privilege Trace feature for identifying exactly which privilege controls a specific UI action or menu path.
SYS-08 systematically investigates every major condition that can cause the issue this diagnostic targets. Below is the complete coverage breakdown.
Completed diagnostic worksheet showing what the full diagnostic picture looks like after all steps have been worked through. Your worksheet will reflect your environment's specific data — the steps, tool sequence, and REST API calls to assemble it are documented in the Audit Trail section below.
════════════════════════════════════════════════════════════
ORACLE FUSION — SECURITY ROLE DIAGNOSTIC
════════════════════════════════════════════════════════════
Username : JMARTINEZ
Issue Reported : Cannot submit Create Accounting ESS job
Case Number : FC-SYS-2026-0712
Report Date : 24-FEB-2026 13:30:18
════════════════════════════════════════════════════════════
[ STEP 1 — REST API ROLE ASSIGNMENTS ] STATUS: ✓ ROLES RETRIEVED
────────────────────────────────────────────────────────────
REST Endpoint : GET /security/users/JMARTINEZ/roles
Assigned Roles : Accounts Payable Specialist, GL Inquiry
Missing Role : Accounting Hub — Journal Entry Management (not assigned) ✗
[ STEP 2 — PRIVILEGE ANALYSIS ] STATUS: ✗ PRIVILEGE MISSING
────────────────────────────────────────────────────────────
Required Privilege : Submit Accounting Hub Processes (FUN_SUBMIT_ACCTG_HUB)
Contained In : Duty: Accounting Hub Management Duty
Contained In : Job Role: Accounting Hub — Journal Entry Management
✗ FAIL: JMARTINEZ does not have this job role assigned
[ STEP 3 — DATA SECURITY CHECK ] STATUS: ✓ PASS
────────────────────────────────────────────────────────────
Data access for US Primary Ledger granted via AP Specialist role ✓
No data security restriction blocking access once role is assigned ✓
[ STEP 4 — SEGREGATION OF DUTIES ] STATUS: ✓ PASS
────────────────────────────────────────────────────────────
No SoD conflict — Accounting Hub role does not conflict with AP Specialist ✓
════════════════════════════════════════════════════════════
FUSION DIAGNOSTIC SUMMARY
════════════════════════════════════════════════════════════
Missing job role — assign Accounting Hub — Journal Entry Management
FIX: Security Console > Users > JMARTINEZ > Add Role
════════════════════════════════════════════════════════════
Fusion Cloud does not permit direct database access. Every corrective action goes through a supported Oracle interface. Before any action is taken, the current state is exported and documented.
Exported before any UI action, ESS resubmission, or FBDI reimport. Provides a point-in-time record of the error state for the KB article and SR documentation if needed.
Oracle Fusion Cloud is a SaaS environment. There is no consultant-accessible Oracle schema, no SQL*Plus connection, and no CONS_BACKUP tablespace. All diagnostic and corrective activity goes through OTBI, REST APIs, BIP reports, ESS programs, and the Fusion UI — the same supported tools Oracle Support uses.
All API calls use OAuth 2.0 authentication. The base URL is your Fusion Cloud instance URL. Replace {instanceName} with your tenant name. Obtain the OAuth token via the /oauth/token endpoint using client credentials.
This article is produced automatically at the end of every SYS-08 execution — written from actual run output. No manual documentation required.
User provisioned with incomplete role set — has AP or GL roles but missing the specific job role containing the required privilege. SYS-08 maps from the reported access issue down to the exact missing role assignment.
User has the correct functional role but data security policy restricts access to a different business unit or legal entity. The most commonly overlooked security layer in Fusion — functional and data security must both be correct.
Requested role assignment conflicts with an existing role — triggers SoD policy violation. SYS-08 identifies the conflicting role pair, the policy, and the exception approval process.
Role assigned but user still cannot access the function. Role propagation delay (10-30 min) is expected — SYS-08 determines whether the delay is normal or whether the User Role Sync ESS job needs to be run.
| Data Source | Type | Purpose |
|---|---|---|
| REST API: /security/users/{id}/roles | REST | Current role assignments for the user |
| Security Console — Role Hierarchy | Fusion UI | Privilege → Duty Role → Job Role mapping |
| Security Console — Privilege Trace | Fusion UI | Exact privilege controlling a UI action or menu item |
| Security Console — Data Access | Fusion UI | BU and legal entity data security grants |
| OTBI: Security Subject Area | OTBI | Population-level user role assignment analysis |
Every condition identified by the diagnostic maps to exactly one resolution path. In Fusion Cloud, all paths go through supported Oracle interfaces — UI, REST API, FBDI, or ESS. Direct database access does not exist in this environment.
Oracle's own Fusion screens, Scheduled Processes (ESS), and workflow tools are always the first resolution path. Manage Invoices, Manage Suppliers, Manage Accounting Periods, BPM Worklist, Scheduled Processes — the diagnostic identifies the exact navigation path and screen sequence for every condition that can be resolved this way. No third-party tools, no API calls, no risk beyond what Oracle's own UI carries.
For bulk corrections or conditions not surfaced in the standard UI, Oracle Fusion's public REST APIs and FBDI import templates are the supported programmatic path. A REST API PATCH call to correct an invoice distribution account, an FBDI resubmission with corrected records after an import failure, or a Mass Update via the REST API — these are supported, documented, and reversible through normal Oracle mechanisms. The current state is exported before any API call is made.
Certain conditions in Fusion Cloud cannot be resolved through any customer-accessible interface. The diagnostic flags these and generates the Service Request documentation:
Before any UI action, ESS resubmission, REST API call, or FBDI reimport — the current error state is exported via OTBI report, BIP report output, or REST API GET response. After the action, a verification step confirms the expected outcome. The complete sequence — tool used, pre-action state, action taken, result verified — is written into the KB article as the primary record of what was done and why.
| Condition Identified | Resolution Path | Notes |
|---|---|---|
| Missing job role — user cannot access function | Functional First | Assign the correct job role via Security Console > Users > Assign Roles after SoD check. SYS-08 identifies the required privilege, the duty role containing it, and the job role to assign. |
| Data security access not granted — correct role, wrong BU | Functional First | Grant data access via Security Console > Manage Data Access for Users. SYS-08 identifies the business unit or legal entity the user needs access to and the data security policy to use. |
| SoD conflict blocking role assignment | Functional First | Review the SoD conflict via Security Console > SoD Policies. SYS-08 identifies the conflicting role pair and the exception approval process if the business requires both roles for the same user. |
| User cannot see navigation menu item | Functional First | Use Security Console > Privilege Trace to identify the exact privilege controlling the menu item. SYS-08 maps the privilege to the duty role and job role to assign. |
| Custom role not inheriting privileges correctly | Functional First | Review the custom role hierarchy via Security Console > Roles. SYS-08 identifies whether the custom role has the correct duty role assignments and whether any inherited privileges have been excluded. |
| Role assignment not taking effect — propagation delay | Functional First | Fusion role propagation typically takes 10-30 minutes. SYS-08 confirms whether the delay is within the normal propagation window or whether a manual User Role Sync ESS submission is needed. |
| User locked out — too many failed login attempts | Functional First | Unlock the account via Security Console > Users > Reset Password or unlock the account. SYS-08 identifies the lockout status and the unlock navigation path. |
| Role missing expected privilege after Oracle update | Oracle Support SR | Oracle quarterly updates sometimes change role-privilege mappings. If an Oracle-seeded role is missing a privilege after a Fusion update, SYS-08 documents the role, privilege, and update version for the Oracle Support SR. |
Fusion Cloud's SaaS architecture eliminates direct database access — which means every action is a supported Oracle API call, UI operation, or ESS submission. Before any action runs, the current error state is captured. After any action, the result is verified.
In EBS R12, a CONS_BACKUP table provides the rollback point. In Fusion Cloud, the equivalent audit trail is built from three sources that together give a complete before-and-after record:
The knowledge base article is generated automatically from the script's execution output. No manual documentation required. It becomes the institutional record — for the team, for auditors, and for every future engagement in the same environment.
References the Oracle public documentation for this diagnostic area. These links open directly on docs.oracle.com.
| Documentation Page | Title | Scenario |
|---|---|---|
| Accounts Payable Manager Job Role | Accounts Payable Manager Job Role — Fusion | Fusion role inheritance and aggregate privilege structure |
| Implement General Ledger | Getting Started with Financials — Security | Business unit data security and HCM security profile configuration |
| Using Payables Invoice To Pay | Using Payables Invoice to Pay — Data Access | Invoice and payment access restriction by business unit in Fusion |
SYS-08 is one of 65 diagnostic scripts covering every major Oracle EBS and Fusion module. William A. Green Consulting runs the script in your environment, applies guided data fixes, and builds the knowledge base that prevents the same issues from recurring.
See this script run autonomously — Oracle AI Platform →